(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*

This guide provides a more detailed description of the syntax that is supported along with examples.

This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.

Concept Search - What can I type?

For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.

Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.

Real-time Inter-network Defense (RID) (RFC6045)

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

K. Moriarty: AUTHOR

Abstract

Incident handling involves the detection, reporting, identification, and mitigation of an attack, whether it be a system compromise, socially engineered phishing attack, or a denial-of-service (DoS) attack. When an attack is detected, the response may include simply filing a report, notification to the source of the attack, a request for mitigation, or the request to locate the source. One of the more difficult cases is that in which the source of an attack is unknown, requiring the ability to trace the attack traffic iteratively upstream through the network for the possibility of any further actions to take place. In cases when accurate records of an active session between the victim system and the attacker or source system are available, the source is easy to identify. The problem of tracing incidents becomes more difficult when the source is obscured or spoofed, logs are deleted, and the number of sources is overwhelming. If the source of an attack is known or identified, it may be desirable to request actions be taken to stop or mitigate the effects of the attack.

Copyright

Copyright (c) 2010 IETF Trust and the persons identified as the

Country

United States

Language

English (United States)

This text was extracted from an ASCII text file.

This is the abbreviated version, containing approximately
2% of the total text.

RID has found use within the international
research communities, but has not been
widely adopted in other sectors. This
publication provides the specification
to those communities that have adopted it,
and communities currently considering solutions for real-time
inter- network defense. The specification may also accelerate
development of solutions where
different transports or message formats are
required by leveraging the data elements and structures specified here.

Moriarty Informational [Page 1]
RFC 6045 RID November 2010

Status of This Memo

This document is not an Internet Standards
Track specification; it is published
for informational purposes.

This document is a product of the Internet
Engineering Task Force (IETF). It represents the consensus of the IETF
community. It has received public review and has been
approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for
any level of Internet Standard; see
Section 2 of RFC 5741.

Information about the current status of this
document, any errata, and how to
provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6045.